메뉴 건너뛰기




Volumn 2014-September, Issue , 2014, Pages 247-253

Detecting malicious users in Twitter using classifiers

Author keywords

Celebrities; Malicious users; Nonmalicious users; Online Social Networks (OSNs); Twitter

Indexed keywords

SOCIAL NETWORKING (ONLINE);

EID: 84938687806     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2659651.2659736     Document Type: Conference Paper
Times cited : (17)

References (47)
  • 1
    • 37249053884 scopus 로고    scopus 로고
    • Social network sites: Definition, history, and scholarship
    • 17 Dec. 2007
    • Boyd D. M. and Ellison N. B. 2007. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication. 13, 1(17 Dec. 2007), 210-230. DOI= 10.1111/j.1083-6101.2007.00393.x.
    • (2007) Journal of Computer-Mediated Communication , vol.13 , Issue.1 , pp. 210-230
    • Boyd, D.M.1    Ellison, N.B.2
  • 2
    • 84938677423 scopus 로고    scopus 로고
    • Accessed: 2014-05-03
    • Statistics of Social Networking Sites: http://expandedramblings.com/index.php/resource-how-manypeople-use-the-top-social-media. Accessed: 2014-05-03.
    • Statistics of Social Networking Sites
  • 5
    • 84938723913 scopus 로고    scopus 로고
    • Accessed: 2014-04-23
    • Spam Attacks Information: http://www.whoswatchingcharlottesville.org/social.html. Accessed: 2014-04-23.
    • Spam Attacks Information
  • 7
    • 84938723914 scopus 로고    scopus 로고
    • Accessed: 2014-04-23
    • Hacking of Twitter accounts: http://BBC News - AP Twitter account hacked in fake 'White House blasts' post.html. Accessed: 2014-04-23.
    • Hacking of Twitter Accounts
  • 8
    • 84938723914 scopus 로고    scopus 로고
    • Accessed: 2014-04-23
    • Hacking of Twitter accounts: http://Twitter resets a quarter of a million accounts after hacker attack.html. Accessed: 2014-04-23.
    • Hacking of Twitter Accounts
  • 9
    • 84938677423 scopus 로고    scopus 로고
    • Accessed: 2014-04-23
    • Statistics of Social Networking Sites: http://expandedramblings.com/index.php/march-2013-by-thenumbers-a-few-amazing-twitter-stats/3/#. U3xVv9KSyuE. Accessed: 2014-04-23.
    • Statistics of Social Networking Sites
  • 12
    • 84938723915 scopus 로고    scopus 로고
    • Accessed: 2014-03-12
    • Facebook Policies: http://developers.facebook.com/policy. Accessed: 2014-03-12.
    • Facebook Policies
  • 13
    • 84938698621 scopus 로고    scopus 로고
    • Accessed: 2014-03-12
    • ZoneAlarm: http://www.zonealarm.com. Accessed: 2014-03-12.
    • ZoneAlarm
  • 14
    • 84938723916 scopus 로고    scopus 로고
    • Accessed: 2014-03-12
    • W. Defensio: http://www.defensio.com. Accessed: 2014-03-12.
    • W. Defensio
  • 15
    • 84938723917 scopus 로고    scopus 로고
    • Accessed: 2014-03-12
    • UnitedParents: http://www.unitedparents.com. Accessed: 2014-03-12.
    • UnitedParents
  • 16
    • 84938723918 scopus 로고    scopus 로고
    • Accessed: 2014-03-12
    • G. ReclaimPrivacy: http://www.reclaimprivacy.org. Accessed: 2014-03-12.
    • G. ReclaimPrivacy
  • 21
    • 77958488685 scopus 로고    scopus 로고
    • Detecting spam bots in online social networking sites: A machine learning approach
    • Springer Berlin Heidelberg
    • Wang A. 2010. Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach. Data and Applications Security and Privacy XXIV, LNCS, Springer Berlin Heidelberg. 6166, 335-342. DOI= 10.1007/978-3-642-13739-6-25.
    • (2010) Data and Applications Security and Privacy XXIV, LNCS , vol.6166 , pp. 335-342
    • Wang, A.1
  • 24
    • 80052767040 scopus 로고    scopus 로고
    • Spam detection on Twitter using traditional classifiers
    • Springer-Verlag Berlin, Heidelberg
    • McCord M. and Chuah M. 2011. Spam Detection on Twitter Using Traditional Classifiers, Autonomic and Trusted Computing. Lecture Notes in Computer Science, Springer-Verlag Berlin, Heidelberg, 6906, 175-186. DOI= 10.1007/978-3-642-23496-5-13.
    • (2011) Autonomic and Trusted Computing. Lecture Notes in Computer Science , vol.6906 , pp. 175-186
    • McCord, M.1    Chuah, M.2
  • 25
    • 84868089771 scopus 로고    scopus 로고
    • An MCL-based approach for spam profile detection in online social networks
    • Liverpool, United Kingdom United Kingdom, June 25-June 27, IEEE
    • Ahmed F. and Abulaish M. 2012. An MCL-Based Approach for Spam Profile Detection in Online Social Networks, In Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (Liverpool, United Kingdom United Kingdom, June 25-June 27), IEEE, 602-608. DOI= http://doi.ieeecomputersociety.org/10.1109/TrustCom.2012.8 3.
    • (2012) Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications , pp. 602-608
    • Ahmed, F.1    Abulaish, M.2
  • 29
    • 84880557073 scopus 로고    scopus 로고
    • Empirical evaluation and new design for fighting evolving twitter spammers
    • August 2013
    • Yang C., Harkreader R. and Guofei Gu 2013. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. IEEE Transactions on Information Forensics and Security, 8, 8(August 2013), 1280-1293. DOI= 10.1109/TIFS.2013.2267732.
    • (2013) IEEE Transactions on Information Forensics and Security , vol.8 , Issue.8 , pp. 1280-1293
    • Yang, C.1    Harkreader, R.2    Gu, G.3
  • 30
    • 84878359270 scopus 로고    scopus 로고
    • A generic statistical approach for spam detection in Online Social Networks
    • Elsevier, April 2013
    • Ahmed F. and Abulaish M. 2013. A generic statistical approach for spam detection in Online Social Networks. Computer Communications Journal, Elsevier, 36, 10-11(April 2013), 1120-1129. DOI= 10.1016/j.comcom.2013.04.004.
    • (2013) Computer Communications Journal , vol.36 , Issue.10-11 , pp. 1120-1129
    • Ahmed, F.1    Abulaish, M.2
  • 35
    • 84893273434 scopus 로고    scopus 로고
    • Strangers intrusion detection - Detecting spammers and fake profiles in social networks based on topology anomalies
    • Fire M., Katz G. and Elovici Y. 2012. Strangers Intrusion Detection - Detecting Spammers and Fake Profiles in Social Networks Based on Topology Anomalies. ASE Human Journal. 26-39.
    • (2012) ASE Human Journal , pp. 26-39
    • Fire, M.1    Katz, G.2    Elovici, Y.3
  • 37
    • 84875624889 scopus 로고    scopus 로고
    • Searching for spam: Detecting fraudulent accounts via web search
    • Springer-Verlag Berlin Heidelberg
    • Flores M. and Kuzmanovic A. 2013. Searching for Spam: Detecting Fraudulent Accounts via Web Search. Lecture Notes in Computer Science (LNCS), Springer-Verlag Berlin Heidelberg, 7799, 208-217. DOI= 10.1007/978-3-642-36516-4-21.
    • (2013) Lecture Notes in Computer Science (LNCS) , vol.7799 , pp. 208-217
    • Flores, M.1    Kuzmanovic, A.2
  • 41
    • 84865622599 scopus 로고    scopus 로고
    • All your contacts are belong to us: Automated identity theft attacks on social networks
    • 2009, April 20-24, 2009, Madrid, Spain, ACM
    • Bilge L., Strufe T., Balzarotti D., and Kirda E. 2009. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In Proceedings of International World Wide Web Conference Committee (IW3C2), WWW 2009, (April 20-24, 2009, Madrid, Spain), ACM, 551-560. DOI= 10.1145/1526709.1526784.
    • (2009) Proceedings of International World Wide Web Conference Committee (IW3C2) , pp. 551-560
    • Bilge, L.1    Strufe, T.2    Balzarotti, D.3    Kirda, E.4
  • 42
    • 84938723922 scopus 로고    scopus 로고
    • Accessed: 2014-03-20
    • Twitter Policy of Spammers: http://help. twitter.com/forums/26257/entries/1831-The Twitter Rules. Accessed: 2014-03-20.
    • Twitter Policy of Spammers
  • 43
    • 84855249570 scopus 로고    scopus 로고
    • Accessed: 2014-03-23
    • Twitter API: https://dev. twitter.com/docs/rate-limiting/1.1. Accessed: 2014-03-23.
    • Twitter API
  • 44
    • 84938683315 scopus 로고    scopus 로고
    • Accessed: 2014-03-23
    • Twitter rate limit for calls: https://dev. twitter.com/docs/api/streaming. Accessed: 2014-03-23.
    • Twitter Rate Limit for Calls
  • 46
    • 1542400030 scopus 로고    scopus 로고
    • Predicting subcellular localization of proteins using machine-learned classifiers
    • Lu Z. 2004. Predicting Subcellular Localization of Proteins using Machine-Learned Classifiers. Bioinformatics, 20, 4, 547-556. DOI= 10.1.1.131.4463.
    • (2004) Bioinformatics , vol.20 , Issue.4 , pp. 547-556
    • Lu, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.